Use of Password Hash With Insufficient Computational Effort in Opencast - CVE-2020-5229
Published: January 29, 2020 / Updated: April 23, 2026
Opencast
Detailed vulnerability description
The vulnerability allows a remote user to disclose sensitive information.
The vulnerability exists due to weak password hashing in password storage in opencast-kernel when an attacker has obtained password hashes from the database. A remote user can crack MD5 password hashes to disclose sensitive information.
The hashes are salted with the username instead of a random salt, which can cause identical hashes for users with the same username and password.